Hackers a group that consisenthusias ts. A black hat is a - TopicsExpress



          

Hackers a group that consisenthusias ts. A black hat is a personthe security of a computer sfrom an authorized party, tThe termwhite hat is used for a persthe abuse of computer systskilled.The term cracker was coineprovide an alternative to usfor this meaning.These are the top 10 Hackebecome famous by their Blarefamous by their Ethical HacWorld’s All Time Best Hackerepresentthem by Hackers only becawrong but one thing is surenot a work of simple mind,that.----- ----------------------------1. Gary McKinnontop 10 hackers gary in worlmounting the largest evergovernment computer netForce, Navy and NASA systethat McKinnon be extraditecharges of illegally accessincausing US$700,000 (400,0damage.-------------------------------- -2. Jonathan JamesJonathan james world top“cOmrade” on the Internet,intercepting 3,300 email mDepartment’s most sensitivstealing data from 13 NASAdevoted to the new Internaames gained notoriety wheto be sent to prison for hact 16 years old. He installedThreat Reduction Agency sef the Department of Defensthreat to the U.S. and its allichemical, conventional andhe created enabled him toand capture employee useralso cracked into NASA comworth approximately $1.7Department of Justice, “TheInternational Space Station’including control of the tewithin the living space.” NAcomputer systems, ultimate---------------------------------3. Adrian Lamoandrew lamo top most hac“homeless hacker,” he usedcoffee shops and libraries tarticle, “He Hacks by Day, Sq“I have a laptop in Pittsburkind of redefines the term“homeless hacker,” he usedcoffee shops and libraries tFor his intrusion at The Neordered to pay approximatHe was also sentenced to siand two years of probation,2007.Lamo is currently workingand public speaker.------- --------------------------4. Kevin Mitnickkevin mitnick top most worJustice describes him as “thcriminalin United States history.” Himovies: Freedom Downtimexploiting the Los Angelesfree rides. Then, like Apple cdabbled in phone phreakinnumerous offenses, Mitnickbreakinginto the Digital Equipmentnetwork and stealing softwable tomove past his role as a blacproductive member of sociabout 8 months of it in solicomputer security consulta---------------------------------5. Kevin Poulsenkevin poulsen worlds bestDante, Poulsen gained recoLA radio’s KIIS-FM phone linstation’s phone lines) whichPorsche,among other items. Law enHannibal Lecter of computepursue Poulsen after he hacdatabase. During this pursuof the FBI by hacking into finformation.His hacking spearoundtelephones. Poulsen’s mostPoulsen also “reactivated olnumbers for an acquaintanagency.” Later, when his phUnsolved Mysteries, 1-800crashed. Ultimately, Poulsesupermarketand served a sentence of fivPoulsen has worked as a joeditor for Wired News. Hishis work on identifying 744profiles.--------------------------------- 6.Robert Tappan Morrismorris one of top 10 hackerNational Security Agency sciis known as the creator of tcomputer worm to be unleAs a result of this crime, heunder the 1986 Computer FMorris wrote the code for tstudent at Cornell. He assertsee how large the Internetreplicated itself excessively,thatthey were no longer usableexactly how many computeestimatean impact of 6,000 machineyears’ probation, 400 hoursfined $10,500.Morris is currprofessor at the MIT CompuIntelligence Laboratory.He principally researches coincluding distributed hash tChord and wireless mesh n---------------------------------7. Vladimir LevinVladimir Levin top most hacaccounts of several large coCitibank via their dial-up wiInstitutions Citibank Cash Mto accounts set up by accoStates, the Netherlands, Geralleged member of the forclaiming to be one of the orpublished under the namepopular Provider.net.ru wemarket.According to him, Levin wa (mathematician, biologist osystemadministrator who managedata about how to penetraand then exploit them.Arkacommun ications were carriInternet was not involved.out Citibank systems wereseveral weeks examining tbased networks remotely.around with systems’ toolsrunning games) and were uPenetrators did not plan topersonal safety and stoppeSomeone of them later hanto Levin (reportedly for the---------------------------------8. David Smithdavid smith top 10 hacker tof the e-mail virus known acomputers around the worlchain letter. He was facingAbout 63,000 viruses havecausing an estimated $65 bis the only person to go to fStates for sending one.---------------------------------9. Mark Abenemark abene internation usAbene (born 1972), better kOptik, is a computer securitPhiber Optik was once a meLegion of Doom and Masterhe served a one-year prisonunauthorized access to comPhiber Optik was a high- prappearing in The New York Timesin debates and on televisiofigure in the 1995 non-ficti— The Gang that Ruled Cyb---------------------------------10. Onel A. de GuzmanOnel A. de Guzman internatiFilipino computer student,He was creator of “Love Bue-mail systems worldwide.
Posted on: Wed, 10 Jul 2013 20:41:26 +0000

Trending Topics



Recently Viewed Topics




© 2015